ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C7AD06E88BE1
|
Infrastructure Scan
ADDRESS: 0x9f113632d69bf5fdd34c81a5daf3933bfcd11d1a
DEPLOYED: 2026-04-27 21:18:23
LAST_TX: 2026-04-29 22:31:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x9f113632d69bf5fdd34c81a5daf3933bfcd11d1a… [FETCH] Metadata hash (IPFS): a270b95e…2b13185c… [SCAN] Identifying function signatures (0x513b79d5). [MEM] Tracking pointer 0x92d5a9ac in memory heap. [VULN] Probing admin methods for ‚Access Control‘ flaws. [SIM] State change detected in slot 0xba. [TRACE] Program Counter (PC) synchronized at 9569. [VALID] Data integrity: SHA256 verified. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x92ad8c50bbedecb426bbf02fdd734675b1d8c897 0x3848a840da61c8beccb86a58e2e59f4574801f39 0xb397f38c665a1e3c30b63ebe37e3963e88c521b7 0xb64adc285a6e5725645a232bfc2398faa83a4479 0x3ad1ca5c4f0b023adbf090e136bb196e4cf3c211 0xab86e3618c92fb0a1b39e7af28933590a19f2278 0x17b85c95a2875a24f2edd3f998d8afce0cefe065 0x74f24acbdc3fa454550ca4f8886648696ab96824 0xd4ed854948950ea7c155a5c38bab7345a6f5dec1 0xf58163ff379afb8072674d73c114743705f71128 0x9edec3ca5d0f5d867cb63647f85bac41965e4d98 0x976c0af59c3a603dc8dbd9bc3f90508e8e26f199 0xdd00eab2f752e5148572936ce26e9e81462f35f0 0xedd57586d98a3526f86fb3c293d191496f680fdf 0x047d452107bb37abbc04b4a5b5b35a9b8d464e55 0x00b3eac531079299b1b62129c827f4105049c538 0xfa9632bbc110d63c9faf9b4a0dbe9997d933eda5 0xc96c76ff6944dd7af8654563ef2b772944a7e128 0xaa20c5066af4c4dd135caf95d4742ea160692afa 0x40bf67115a4e911e70846c91828334dfc2a6501e

0 Kommentare